aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--deploy/flake.lock89
-rw-r--r--flake.lock89
-rw-r--r--flakes/flake.lock87
-rw-r--r--flakes/private/borg_backup/flake.nix9
-rw-r--r--systems/backup-2/base.nix1
-rw-r--r--systems/backup-2/flake.lock2
-rw-r--r--systems/eldiron/flake.lock2
-rw-r--r--systems/zoldene/base.nix3
-rw-r--r--systems/zoldene/flake.lock43
-rw-r--r--systems/zoldene/flake.nix2
-rw-r--r--systems/zoldene/virtualisation.nix18
11 files changed, 269 insertions, 76 deletions
diff --git a/deploy/flake.lock b/deploy/flake.lock
index bd2ffb4..0424355 100644
--- a/deploy/flake.lock
+++ b/deploy/flake.lock
@@ -119,7 +119,7 @@
119 }, 119 },
120 "locked": { 120 "locked": {
121 "lastModified": 1, 121 "lastModified": 1,
122 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 122 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
123 "path": "../../flakes/private/borg_backup", 123 "path": "../../flakes/private/borg_backup",
124 "type": "path" 124 "type": "path"
125 }, 125 },
@@ -926,6 +926,18 @@
926 "type": "path" 926 "type": "path"
927 } 927 }
928 }, 928 },
929 "environment_36": {
930 "locked": {
931 "lastModified": 1,
932 "narHash": "sha256-PQ5694ARRlpj00lk/C/T0UPGhPO+n0TEcLR1mde0s8M=",
933 "path": "../environment",
934 "type": "path"
935 },
936 "original": {
937 "path": "../environment",
938 "type": "path"
939 }
940 },
929 "environment_4": { 941 "environment_4": {
930 "locked": { 942 "locked": {
931 "lastModified": 1, 943 "lastModified": 1,
@@ -2836,7 +2848,7 @@
2836 }, 2848 },
2837 "locked": { 2849 "locked": {
2838 "lastModified": 1, 2850 "lastModified": 1,
2839 "narHash": "sha256-UeVBaRHhhvyP3ueiuo2+Xo8DusK9WuyHwuOllENlmvc=", 2851 "narHash": "sha256-2fqc9ZDvQpvgXGdT65wit8tr7Q9QeQQ5qSh2qM24mkw=",
2840 "path": "../flakes", 2852 "path": "../flakes",
2841 "type": "path" 2853 "type": "path"
2842 }, 2854 },
@@ -3886,7 +3898,7 @@
3886 }, 3898 },
3887 "locked": { 3899 "locked": {
3888 "lastModified": 1, 3900 "lastModified": 1,
3889 "narHash": "sha256-eWqhsiYAFY0WoF24muaGHQ86FXgBsiuQ30VY7eOQ5IA=", 3901 "narHash": "sha256-0vnHkdR8S1iOAjNl4pQx/Tehv43IfkTw30momDbDWyE=",
3890 "path": "../systems/backup-2", 3902 "path": "../systems/backup-2",
3891 "type": "path" 3903 "type": "path"
3892 }, 3904 },
@@ -3958,7 +3970,7 @@
3958 }, 3970 },
3959 "locked": { 3971 "locked": {
3960 "lastModified": 1, 3972 "lastModified": 1,
3961 "narHash": "sha256-74KlRId81x4Vj7fOQBteygUqYLvmKrDvGbQyzl0Zysc=", 3973 "narHash": "sha256-DYnB2oXltA+Xqoeaz64z0e1tO5tmaqyV7jq28MK9wiM=",
3962 "path": "../systems/eldiron", 3974 "path": "../systems/eldiron",
3963 "type": "path" 3975 "type": "path"
3964 }, 3976 },
@@ -4023,13 +4035,14 @@
4023 "impermanence": "impermanence", 4035 "impermanence": "impermanence",
4024 "my-lib": "my-lib_6", 4036 "my-lib": "my-lib_6",
4025 "nixpkgs": "nixpkgs_71", 4037 "nixpkgs": "nixpkgs_71",
4038 "private-borg-backup": "private-borg-backup_2",
4026 "private-environment": "private-environment_2", 4039 "private-environment": "private-environment_2",
4027 "private-system": "private-system_2", 4040 "private-system": "private-system_2",
4028 "public-secrets": "public-secrets_2" 4041 "public-secrets": "public-secrets_2"
4029 }, 4042 },
4030 "locked": { 4043 "locked": {
4031 "lastModified": 1, 4044 "lastModified": 1,
4032 "narHash": "sha256-XQ6MS/zL/AVQd71NG8h2mbbxjuRU3dKLi1s2qTY3Z/0=", 4045 "narHash": "sha256-xzA9F1DcwBysoy8gVss57IQ2ivWsMCi5PJxLHJDqEUM=",
4033 "path": "../systems/zoldene", 4046 "path": "../systems/zoldene",
4034 "type": "path" 4047 "type": "path"
4035 }, 4048 },
@@ -7519,7 +7532,23 @@
7519 }, 7532 },
7520 "locked": { 7533 "locked": {
7521 "lastModified": 1, 7534 "lastModified": 1,
7522 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 7535 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
7536 "path": "../../flakes/private/borg_backup",
7537 "type": "path"
7538 },
7539 "original": {
7540 "path": "../../flakes/private/borg_backup",
7541 "type": "path"
7542 }
7543 },
7544 "private-borg-backup_2": {
7545 "inputs": {
7546 "environment": "environment_27",
7547 "secrets": "secrets_21"
7548 },
7549 "locked": {
7550 "lastModified": 1,
7551 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
7523 "path": "../../flakes/private/borg_backup", 7552 "path": "../../flakes/private/borg_backup",
7524 "type": "path" 7553 "type": "path"
7525 }, 7554 },
@@ -7739,7 +7768,7 @@
7739 "private-system_2": { 7768 "private-system_2": {
7740 "inputs": { 7769 "inputs": {
7741 "backports": "backports_6", 7770 "backports": "backports_6",
7742 "environment": "environment_27", 7771 "environment": "environment_28",
7743 "mypackages": "mypackages_9", 7772 "mypackages": "mypackages_9",
7744 "myuids": "myuids_28", 7773 "myuids": "myuids_28",
7745 "secrets-public": "secrets-public_6" 7774 "secrets-public": "secrets-public_6"
@@ -8076,7 +8105,7 @@
8076 "devshell": "devshell", 8105 "devshell": "devshell",
8077 "main-flake": "main-flake", 8106 "main-flake": "main-flake",
8078 "nixpkgs": "nixpkgs_105", 8107 "nixpkgs": "nixpkgs_105",
8079 "secrets": "secrets_28" 8108 "secrets": "secrets_29"
8080 } 8109 }
8081 }, 8110 },
8082 "rsync_backup": { 8111 "rsync_backup": {
@@ -8397,12 +8426,12 @@
8397 }, 8426 },
8398 "s-private-borg-backup": { 8427 "s-private-borg-backup": {
8399 "inputs": { 8428 "inputs": {
8400 "environment": "environment_28", 8429 "environment": "environment_29",
8401 "secrets": "secrets_21" 8430 "secrets": "secrets_22"
8402 }, 8431 },
8403 "locked": { 8432 "locked": {
8404 "lastModified": 1, 8433 "lastModified": 1,
8405 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 8434 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
8406 "path": "./private/borg_backup", 8435 "path": "./private/borg_backup",
8407 "type": "path" 8436 "type": "path"
8408 }, 8437 },
@@ -8430,7 +8459,7 @@
8430 }, 8459 },
8431 "s-private-chatons": { 8460 "s-private-chatons": {
8432 "inputs": { 8461 "inputs": {
8433 "environment": "environment_29" 8462 "environment": "environment_30"
8434 }, 8463 },
8435 "locked": { 8464 "locked": {
8436 "lastModified": 1, 8465 "lastModified": 1,
@@ -8457,8 +8486,8 @@
8457 }, 8486 },
8458 "s-private-mail-relay": { 8487 "s-private-mail-relay": {
8459 "inputs": { 8488 "inputs": {
8460 "environment": "environment_30", 8489 "environment": "environment_31",
8461 "secrets": "secrets_22" 8490 "secrets": "secrets_23"
8462 }, 8491 },
8463 "locked": { 8492 "locked": {
8464 "lastModified": 1, 8493 "lastModified": 1,
@@ -8473,11 +8502,11 @@
8473 }, 8502 },
8474 "s-private-milters": { 8503 "s-private-milters": {
8475 "inputs": { 8504 "inputs": {
8476 "environment": "environment_31", 8505 "environment": "environment_32",
8477 "files-watcher": "files-watcher_13", 8506 "files-watcher": "files-watcher_13",
8478 "openarc": "openarc_12", 8507 "openarc": "openarc_12",
8479 "opendmarc": "opendmarc_6", 8508 "opendmarc": "opendmarc_6",
8480 "secrets": "secrets_23" 8509 "secrets": "secrets_24"
8481 }, 8510 },
8482 "locked": { 8511 "locked": {
8483 "lastModified": 1, 8512 "lastModified": 1,
@@ -8492,10 +8521,10 @@
8492 }, 8521 },
8493 "s-private-monitoring": { 8522 "s-private-monitoring": {
8494 "inputs": { 8523 "inputs": {
8495 "environment": "environment_32", 8524 "environment": "environment_33",
8496 "naemon": "naemon_6", 8525 "naemon": "naemon_6",
8497 "nixpkgs-lib": "nixpkgs-lib_26", 8526 "nixpkgs-lib": "nixpkgs-lib_26",
8498 "secrets": "secrets_24" 8527 "secrets": "secrets_25"
8499 }, 8528 },
8500 "locked": { 8529 "locked": {
8501 "lastModified": 1, 8530 "lastModified": 1,
@@ -8512,7 +8541,7 @@
8512 "inputs": { 8541 "inputs": {
8513 "files-watcher": "files-watcher_14", 8542 "files-watcher": "files-watcher_14",
8514 "openarc": "openarc_14", 8543 "openarc": "openarc_14",
8515 "secrets": "secrets_25" 8544 "secrets": "secrets_26"
8516 }, 8545 },
8517 "locked": { 8546 "locked": {
8518 "lastModified": 1, 8547 "lastModified": 1,
@@ -8527,10 +8556,10 @@
8527 }, 8556 },
8528 "s-private-opendmarc": { 8557 "s-private-opendmarc": {
8529 "inputs": { 8558 "inputs": {
8530 "environment": "environment_33", 8559 "environment": "environment_34",
8531 "files-watcher": "files-watcher_15", 8560 "files-watcher": "files-watcher_15",
8532 "opendmarc": "opendmarc_7", 8561 "opendmarc": "opendmarc_7",
8533 "secrets": "secrets_26" 8562 "secrets": "secrets_27"
8534 }, 8563 },
8535 "locked": { 8564 "locked": {
8536 "lastModified": 1, 8565 "lastModified": 1,
@@ -8590,8 +8619,8 @@
8590 }, 8619 },
8591 "s-private-ssh": { 8620 "s-private-ssh": {
8592 "inputs": { 8621 "inputs": {
8593 "environment": "environment_34", 8622 "environment": "environment_35",
8594 "secrets": "secrets_27" 8623 "secrets": "secrets_28"
8595 }, 8624 },
8596 "locked": { 8625 "locked": {
8597 "lastModified": 1, 8626 "lastModified": 1,
@@ -8607,7 +8636,7 @@
8607 "s-private-system": { 8636 "s-private-system": {
8608 "inputs": { 8637 "inputs": {
8609 "backports": "backports_7", 8638 "backports": "backports_7",
8610 "environment": "environment_35", 8639 "environment": "environment_36",
8611 "mypackages": "mypackages_12", 8640 "mypackages": "mypackages_12",
8612 "myuids": "myuids_42", 8641 "myuids": "myuids_42",
8613 "secrets-public": "secrets-public_7" 8642 "secrets-public": "secrets-public_7"
@@ -9007,6 +9036,18 @@
9007 } 9036 }
9008 }, 9037 },
9009 "secrets_28": { 9038 "secrets_28": {
9039 "locked": {
9040 "lastModified": 1,
9041 "narHash": "sha256-5AakznhrJFmwCD7lr4JEh55MtdAJL6WA/YuBks6ISSE=",
9042 "path": "../../secrets",
9043 "type": "path"
9044 },
9045 "original": {
9046 "path": "../../secrets",
9047 "type": "path"
9048 }
9049 },
9050 "secrets_29": {
9010 "inputs": { 9051 "inputs": {
9011 "nixpkgs": "nixpkgs_106" 9052 "nixpkgs": "nixpkgs_106"
9012 }, 9053 },
diff --git a/flake.lock b/flake.lock
index 249b42c..0ef8c4c 100644
--- a/flake.lock
+++ b/flake.lock
@@ -119,7 +119,7 @@
119 }, 119 },
120 "locked": { 120 "locked": {
121 "lastModified": 1, 121 "lastModified": 1,
122 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 122 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
123 "path": "../../flakes/private/borg_backup", 123 "path": "../../flakes/private/borg_backup",
124 "type": "path" 124 "type": "path"
125 }, 125 },
@@ -926,6 +926,18 @@
926 "type": "path" 926 "type": "path"
927 } 927 }
928 }, 928 },
929 "environment_36": {
930 "locked": {
931 "lastModified": 1,
932 "narHash": "sha256-PQ5694ARRlpj00lk/C/T0UPGhPO+n0TEcLR1mde0s8M=",
933 "path": "../environment",
934 "type": "path"
935 },
936 "original": {
937 "path": "../environment",
938 "type": "path"
939 }
940 },
929 "environment_4": { 941 "environment_4": {
930 "locked": { 942 "locked": {
931 "lastModified": 1, 943 "lastModified": 1,
@@ -2713,11 +2725,11 @@
2713 "s-secrets": "s-secrets", 2725 "s-secrets": "s-secrets",
2714 "s-surfer": "s-surfer", 2726 "s-surfer": "s-surfer",
2715 "s-taskwarrior-web": "s-taskwarrior-web", 2727 "s-taskwarrior-web": "s-taskwarrior-web",
2716 "secrets": "secrets_28" 2728 "secrets": "secrets_29"
2717 }, 2729 },
2718 "locked": { 2730 "locked": {
2719 "lastModified": 1, 2731 "lastModified": 1,
2720 "narHash": "sha256-UeVBaRHhhvyP3ueiuo2+Xo8DusK9WuyHwuOllENlmvc=", 2732 "narHash": "sha256-2fqc9ZDvQpvgXGdT65wit8tr7Q9QeQQ5qSh2qM24mkw=",
2721 "path": "./flakes", 2733 "path": "./flakes",
2722 "type": "path" 2734 "type": "path"
2723 }, 2735 },
@@ -3902,7 +3914,7 @@
3902 }, 3914 },
3903 "locked": { 3915 "locked": {
3904 "lastModified": 1, 3916 "lastModified": 1,
3905 "narHash": "sha256-eWqhsiYAFY0WoF24muaGHQ86FXgBsiuQ30VY7eOQ5IA=", 3917 "narHash": "sha256-0vnHkdR8S1iOAjNl4pQx/Tehv43IfkTw30momDbDWyE=",
3906 "path": "../systems/backup-2", 3918 "path": "../systems/backup-2",
3907 "type": "path" 3919 "type": "path"
3908 }, 3920 },
@@ -3974,7 +3986,7 @@
3974 }, 3986 },
3975 "locked": { 3987 "locked": {
3976 "lastModified": 1, 3988 "lastModified": 1,
3977 "narHash": "sha256-74KlRId81x4Vj7fOQBteygUqYLvmKrDvGbQyzl0Zysc=", 3989 "narHash": "sha256-DYnB2oXltA+Xqoeaz64z0e1tO5tmaqyV7jq28MK9wiM=",
3978 "path": "../systems/eldiron", 3990 "path": "../systems/eldiron",
3979 "type": "path" 3991 "type": "path"
3980 }, 3992 },
@@ -4039,13 +4051,14 @@
4039 "impermanence": "impermanence", 4051 "impermanence": "impermanence",
4040 "my-lib": "my-lib_6", 4052 "my-lib": "my-lib_6",
4041 "nixpkgs": "nixpkgs_71", 4053 "nixpkgs": "nixpkgs_71",
4054 "private-borg-backup": "private-borg-backup_2",
4042 "private-environment": "private-environment_2", 4055 "private-environment": "private-environment_2",
4043 "private-system": "private-system_2", 4056 "private-system": "private-system_2",
4044 "public-secrets": "public-secrets_2" 4057 "public-secrets": "public-secrets_2"
4045 }, 4058 },
4046 "locked": { 4059 "locked": {
4047 "lastModified": 1, 4060 "lastModified": 1,
4048 "narHash": "sha256-XQ6MS/zL/AVQd71NG8h2mbbxjuRU3dKLi1s2qTY3Z/0=", 4061 "narHash": "sha256-xzA9F1DcwBysoy8gVss57IQ2ivWsMCi5PJxLHJDqEUM=",
4049 "path": "../systems/zoldene", 4062 "path": "../systems/zoldene",
4050 "type": "path" 4063 "type": "path"
4051 }, 4064 },
@@ -7535,7 +7548,23 @@
7535 }, 7548 },
7536 "locked": { 7549 "locked": {
7537 "lastModified": 1, 7550 "lastModified": 1,
7538 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 7551 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
7552 "path": "../../flakes/private/borg_backup",
7553 "type": "path"
7554 },
7555 "original": {
7556 "path": "../../flakes/private/borg_backup",
7557 "type": "path"
7558 }
7559 },
7560 "private-borg-backup_2": {
7561 "inputs": {
7562 "environment": "environment_27",
7563 "secrets": "secrets_21"
7564 },
7565 "locked": {
7566 "lastModified": 1,
7567 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
7539 "path": "../../flakes/private/borg_backup", 7568 "path": "../../flakes/private/borg_backup",
7540 "type": "path" 7569 "type": "path"
7541 }, 7570 },
@@ -7755,7 +7784,7 @@
7755 "private-system_2": { 7784 "private-system_2": {
7756 "inputs": { 7785 "inputs": {
7757 "backports": "backports_6", 7786 "backports": "backports_6",
7758 "environment": "environment_27", 7787 "environment": "environment_28",
7759 "mypackages": "mypackages_9", 7788 "mypackages": "mypackages_9",
7760 "myuids": "myuids_28", 7789 "myuids": "myuids_28",
7761 "secrets-public": "secrets-public_6" 7790 "secrets-public": "secrets-public_6"
@@ -8413,12 +8442,12 @@
8413 }, 8442 },
8414 "s-private-borg-backup": { 8443 "s-private-borg-backup": {
8415 "inputs": { 8444 "inputs": {
8416 "environment": "environment_28", 8445 "environment": "environment_29",
8417 "secrets": "secrets_21" 8446 "secrets": "secrets_22"
8418 }, 8447 },
8419 "locked": { 8448 "locked": {
8420 "lastModified": 1, 8449 "lastModified": 1,
8421 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 8450 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
8422 "path": "./private/borg_backup", 8451 "path": "./private/borg_backup",
8423 "type": "path" 8452 "type": "path"
8424 }, 8453 },
@@ -8446,7 +8475,7 @@
8446 }, 8475 },
8447 "s-private-chatons": { 8476 "s-private-chatons": {
8448 "inputs": { 8477 "inputs": {
8449 "environment": "environment_29" 8478 "environment": "environment_30"
8450 }, 8479 },
8451 "locked": { 8480 "locked": {
8452 "lastModified": 1, 8481 "lastModified": 1,
@@ -8473,8 +8502,8 @@
8473 }, 8502 },
8474 "s-private-mail-relay": { 8503 "s-private-mail-relay": {
8475 "inputs": { 8504 "inputs": {
8476 "environment": "environment_30", 8505 "environment": "environment_31",
8477 "secrets": "secrets_22" 8506 "secrets": "secrets_23"
8478 }, 8507 },
8479 "locked": { 8508 "locked": {
8480 "lastModified": 1, 8509 "lastModified": 1,
@@ -8489,11 +8518,11 @@
8489 }, 8518 },
8490 "s-private-milters": { 8519 "s-private-milters": {
8491 "inputs": { 8520 "inputs": {
8492 "environment": "environment_31", 8521 "environment": "environment_32",
8493 "files-watcher": "files-watcher_13", 8522 "files-watcher": "files-watcher_13",
8494 "openarc": "openarc_12", 8523 "openarc": "openarc_12",
8495 "opendmarc": "opendmarc_6", 8524 "opendmarc": "opendmarc_6",
8496 "secrets": "secrets_23" 8525 "secrets": "secrets_24"
8497 }, 8526 },
8498 "locked": { 8527 "locked": {
8499 "lastModified": 1, 8528 "lastModified": 1,
@@ -8508,10 +8537,10 @@
8508 }, 8537 },
8509 "s-private-monitoring": { 8538 "s-private-monitoring": {
8510 "inputs": { 8539 "inputs": {
8511 "environment": "environment_32", 8540 "environment": "environment_33",
8512 "naemon": "naemon_6", 8541 "naemon": "naemon_6",
8513 "nixpkgs-lib": "nixpkgs-lib_27", 8542 "nixpkgs-lib": "nixpkgs-lib_27",
8514 "secrets": "secrets_24" 8543 "secrets": "secrets_25"
8515 }, 8544 },
8516 "locked": { 8545 "locked": {
8517 "lastModified": 1, 8546 "lastModified": 1,
@@ -8528,7 +8557,7 @@
8528 "inputs": { 8557 "inputs": {
8529 "files-watcher": "files-watcher_14", 8558 "files-watcher": "files-watcher_14",
8530 "openarc": "openarc_14", 8559 "openarc": "openarc_14",
8531 "secrets": "secrets_25" 8560 "secrets": "secrets_26"
8532 }, 8561 },
8533 "locked": { 8562 "locked": {
8534 "lastModified": 1, 8563 "lastModified": 1,
@@ -8543,10 +8572,10 @@
8543 }, 8572 },
8544 "s-private-opendmarc": { 8573 "s-private-opendmarc": {
8545 "inputs": { 8574 "inputs": {
8546 "environment": "environment_33", 8575 "environment": "environment_34",
8547 "files-watcher": "files-watcher_15", 8576 "files-watcher": "files-watcher_15",
8548 "opendmarc": "opendmarc_7", 8577 "opendmarc": "opendmarc_7",
8549 "secrets": "secrets_26" 8578 "secrets": "secrets_27"
8550 }, 8579 },
8551 "locked": { 8580 "locked": {
8552 "lastModified": 1, 8581 "lastModified": 1,
@@ -8606,8 +8635,8 @@
8606 }, 8635 },
8607 "s-private-ssh": { 8636 "s-private-ssh": {
8608 "inputs": { 8637 "inputs": {
8609 "environment": "environment_34", 8638 "environment": "environment_35",
8610 "secrets": "secrets_27" 8639 "secrets": "secrets_28"
8611 }, 8640 },
8612 "locked": { 8641 "locked": {
8613 "lastModified": 1, 8642 "lastModified": 1,
@@ -8623,7 +8652,7 @@
8623 "s-private-system": { 8652 "s-private-system": {
8624 "inputs": { 8653 "inputs": {
8625 "backports": "backports_7", 8654 "backports": "backports_7",
8626 "environment": "environment_35", 8655 "environment": "environment_36",
8627 "mypackages": "mypackages_12", 8656 "mypackages": "mypackages_12",
8628 "myuids": "myuids_42", 8657 "myuids": "myuids_42",
8629 "secrets-public": "secrets-public_7" 8658 "secrets-public": "secrets-public_7"
@@ -9025,6 +9054,18 @@
9025 "secrets_28": { 9054 "secrets_28": {
9026 "locked": { 9055 "locked": {
9027 "lastModified": 1, 9056 "lastModified": 1,
9057 "narHash": "sha256-5AakznhrJFmwCD7lr4JEh55MtdAJL6WA/YuBks6ISSE=",
9058 "path": "../../secrets",
9059 "type": "path"
9060 },
9061 "original": {
9062 "path": "../../secrets",
9063 "type": "path"
9064 }
9065 },
9066 "secrets_29": {
9067 "locked": {
9068 "lastModified": 1,
9028 "narHash": "sha256-yvhc2jxW1AQVmtrKPoYPr5DgpXKt/ua+ATuxvE3iY6c=", 9069 "narHash": "sha256-yvhc2jxW1AQVmtrKPoYPr5DgpXKt/ua+ATuxvE3iY6c=",
9029 "path": "./private/environment-dummy", 9070 "path": "./private/environment-dummy",
9030 "type": "path" 9071 "type": "path"
diff --git a/flakes/flake.lock b/flakes/flake.lock
index 4d254d8..b8f281f 100644
--- a/flakes/flake.lock
+++ b/flakes/flake.lock
@@ -119,7 +119,7 @@
119 }, 119 },
120 "locked": { 120 "locked": {
121 "lastModified": 1, 121 "lastModified": 1,
122 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 122 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
123 "path": "../../flakes/private/borg_backup", 123 "path": "../../flakes/private/borg_backup",
124 "type": "path" 124 "type": "path"
125 }, 125 },
@@ -906,6 +906,18 @@
906 "type": "path" 906 "type": "path"
907 } 907 }
908 }, 908 },
909 "environment_36": {
910 "locked": {
911 "lastModified": 1,
912 "narHash": "sha256-PQ5694ARRlpj00lk/C/T0UPGhPO+n0TEcLR1mde0s8M=",
913 "path": "../environment",
914 "type": "path"
915 },
916 "original": {
917 "path": "../environment",
918 "type": "path"
919 }
920 },
909 "environment_4": { 921 "environment_4": {
910 "locked": { 922 "locked": {
911 "lastModified": 1, 923 "lastModified": 1,
@@ -3806,7 +3818,7 @@
3806 }, 3818 },
3807 "locked": { 3819 "locked": {
3808 "lastModified": 1, 3820 "lastModified": 1,
3809 "narHash": "sha256-eWqhsiYAFY0WoF24muaGHQ86FXgBsiuQ30VY7eOQ5IA=", 3821 "narHash": "sha256-0vnHkdR8S1iOAjNl4pQx/Tehv43IfkTw30momDbDWyE=",
3810 "path": "../systems/backup-2", 3822 "path": "../systems/backup-2",
3811 "type": "path" 3823 "type": "path"
3812 }, 3824 },
@@ -3878,7 +3890,7 @@
3878 }, 3890 },
3879 "locked": { 3891 "locked": {
3880 "lastModified": 1, 3892 "lastModified": 1,
3881 "narHash": "sha256-74KlRId81x4Vj7fOQBteygUqYLvmKrDvGbQyzl0Zysc=", 3893 "narHash": "sha256-DYnB2oXltA+Xqoeaz64z0e1tO5tmaqyV7jq28MK9wiM=",
3882 "path": "../systems/eldiron", 3894 "path": "../systems/eldiron",
3883 "type": "path" 3895 "type": "path"
3884 }, 3896 },
@@ -3943,13 +3955,14 @@
3943 "impermanence": "impermanence", 3955 "impermanence": "impermanence",
3944 "my-lib": "my-lib_6", 3956 "my-lib": "my-lib_6",
3945 "nixpkgs": "nixpkgs_70", 3957 "nixpkgs": "nixpkgs_70",
3958 "private-borg-backup": "private-borg-backup_2",
3946 "private-environment": "private-environment_2", 3959 "private-environment": "private-environment_2",
3947 "private-system": "private-system_2", 3960 "private-system": "private-system_2",
3948 "public-secrets": "public-secrets_2" 3961 "public-secrets": "public-secrets_2"
3949 }, 3962 },
3950 "locked": { 3963 "locked": {
3951 "lastModified": 1, 3964 "lastModified": 1,
3952 "narHash": "sha256-XQ6MS/zL/AVQd71NG8h2mbbxjuRU3dKLi1s2qTY3Z/0=", 3965 "narHash": "sha256-xzA9F1DcwBysoy8gVss57IQ2ivWsMCi5PJxLHJDqEUM=",
3953 "path": "../systems/zoldene", 3966 "path": "../systems/zoldene",
3954 "type": "path" 3967 "type": "path"
3955 }, 3968 },
@@ -7361,7 +7374,23 @@
7361 }, 7374 },
7362 "locked": { 7375 "locked": {
7363 "lastModified": 1, 7376 "lastModified": 1,
7364 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 7377 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
7378 "path": "../../flakes/private/borg_backup",
7379 "type": "path"
7380 },
7381 "original": {
7382 "path": "../../flakes/private/borg_backup",
7383 "type": "path"
7384 }
7385 },
7386 "private-borg-backup_2": {
7387 "inputs": {
7388 "environment": "environment_27",
7389 "secrets": "secrets_21"
7390 },
7391 "locked": {
7392 "lastModified": 1,
7393 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
7365 "path": "../../flakes/private/borg_backup", 7394 "path": "../../flakes/private/borg_backup",
7366 "type": "path" 7395 "type": "path"
7367 }, 7396 },
@@ -7581,7 +7610,7 @@
7581 "private-system_2": { 7610 "private-system_2": {
7582 "inputs": { 7611 "inputs": {
7583 "backports": "backports_6", 7612 "backports": "backports_6",
7584 "environment": "environment_27", 7613 "environment": "environment_28",
7585 "mypackages": "mypackages_9", 7614 "mypackages": "mypackages_9",
7586 "myuids": "myuids_28", 7615 "myuids": "myuids_28",
7587 "secrets-public": "secrets-public_6" 7616 "secrets-public": "secrets-public_6"
@@ -7958,7 +7987,7 @@
7958 "s-secrets": "s-secrets", 7987 "s-secrets": "s-secrets",
7959 "s-surfer": "s-surfer", 7988 "s-surfer": "s-surfer",
7960 "s-taskwarrior-web": "s-taskwarrior-web", 7989 "s-taskwarrior-web": "s-taskwarrior-web",
7961 "secrets": "secrets_28" 7990 "secrets": "secrets_29"
7962 } 7991 }
7963 }, 7992 },
7964 "rsync_backup": { 7993 "rsync_backup": {
@@ -8279,12 +8308,12 @@
8279 }, 8308 },
8280 "s-private-borg-backup": { 8309 "s-private-borg-backup": {
8281 "inputs": { 8310 "inputs": {
8282 "environment": "environment_28", 8311 "environment": "environment_29",
8283 "secrets": "secrets_21" 8312 "secrets": "secrets_22"
8284 }, 8313 },
8285 "locked": { 8314 "locked": {
8286 "lastModified": 1, 8315 "lastModified": 1,
8287 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 8316 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
8288 "path": "./private/borg_backup", 8317 "path": "./private/borg_backup",
8289 "type": "path" 8318 "type": "path"
8290 }, 8319 },
@@ -8312,7 +8341,7 @@
8312 }, 8341 },
8313 "s-private-chatons": { 8342 "s-private-chatons": {
8314 "inputs": { 8343 "inputs": {
8315 "environment": "environment_29" 8344 "environment": "environment_30"
8316 }, 8345 },
8317 "locked": { 8346 "locked": {
8318 "lastModified": 1, 8347 "lastModified": 1,
@@ -8339,8 +8368,8 @@
8339 }, 8368 },
8340 "s-private-mail-relay": { 8369 "s-private-mail-relay": {
8341 "inputs": { 8370 "inputs": {
8342 "environment": "environment_30", 8371 "environment": "environment_31",
8343 "secrets": "secrets_22" 8372 "secrets": "secrets_23"
8344 }, 8373 },
8345 "locked": { 8374 "locked": {
8346 "lastModified": 1, 8375 "lastModified": 1,
@@ -8355,11 +8384,11 @@
8355 }, 8384 },
8356 "s-private-milters": { 8385 "s-private-milters": {
8357 "inputs": { 8386 "inputs": {
8358 "environment": "environment_31", 8387 "environment": "environment_32",
8359 "files-watcher": "files-watcher_13", 8388 "files-watcher": "files-watcher_13",
8360 "openarc": "openarc_12", 8389 "openarc": "openarc_12",
8361 "opendmarc": "opendmarc_6", 8390 "opendmarc": "opendmarc_6",
8362 "secrets": "secrets_23" 8391 "secrets": "secrets_24"
8363 }, 8392 },
8364 "locked": { 8393 "locked": {
8365 "lastModified": 1, 8394 "lastModified": 1,
@@ -8374,10 +8403,10 @@
8374 }, 8403 },
8375 "s-private-monitoring": { 8404 "s-private-monitoring": {
8376 "inputs": { 8405 "inputs": {
8377 "environment": "environment_32", 8406 "environment": "environment_33",
8378 "naemon": "naemon_6", 8407 "naemon": "naemon_6",
8379 "nixpkgs-lib": "nixpkgs-lib_26", 8408 "nixpkgs-lib": "nixpkgs-lib_26",
8380 "secrets": "secrets_24" 8409 "secrets": "secrets_25"
8381 }, 8410 },
8382 "locked": { 8411 "locked": {
8383 "lastModified": 1, 8412 "lastModified": 1,
@@ -8394,7 +8423,7 @@
8394 "inputs": { 8423 "inputs": {
8395 "files-watcher": "files-watcher_14", 8424 "files-watcher": "files-watcher_14",
8396 "openarc": "openarc_14", 8425 "openarc": "openarc_14",
8397 "secrets": "secrets_25" 8426 "secrets": "secrets_26"
8398 }, 8427 },
8399 "locked": { 8428 "locked": {
8400 "lastModified": 1, 8429 "lastModified": 1,
@@ -8409,10 +8438,10 @@
8409 }, 8438 },
8410 "s-private-opendmarc": { 8439 "s-private-opendmarc": {
8411 "inputs": { 8440 "inputs": {
8412 "environment": "environment_33", 8441 "environment": "environment_34",
8413 "files-watcher": "files-watcher_15", 8442 "files-watcher": "files-watcher_15",
8414 "opendmarc": "opendmarc_7", 8443 "opendmarc": "opendmarc_7",
8415 "secrets": "secrets_26" 8444 "secrets": "secrets_27"
8416 }, 8445 },
8417 "locked": { 8446 "locked": {
8418 "lastModified": 1, 8447 "lastModified": 1,
@@ -8472,8 +8501,8 @@
8472 }, 8501 },
8473 "s-private-ssh": { 8502 "s-private-ssh": {
8474 "inputs": { 8503 "inputs": {
8475 "environment": "environment_34", 8504 "environment": "environment_35",
8476 "secrets": "secrets_27" 8505 "secrets": "secrets_28"
8477 }, 8506 },
8478 "locked": { 8507 "locked": {
8479 "lastModified": 1, 8508 "lastModified": 1,
@@ -8489,7 +8518,7 @@
8489 "s-private-system": { 8518 "s-private-system": {
8490 "inputs": { 8519 "inputs": {
8491 "backports": "backports_7", 8520 "backports": "backports_7",
8492 "environment": "environment_35", 8521 "environment": "environment_36",
8493 "mypackages": "mypackages_12", 8522 "mypackages": "mypackages_12",
8494 "myuids": "myuids_42", 8523 "myuids": "myuids_42",
8495 "secrets-public": "secrets-public_7" 8524 "secrets-public": "secrets-public_7"
@@ -8891,6 +8920,18 @@
8891 "secrets_28": { 8920 "secrets_28": {
8892 "locked": { 8921 "locked": {
8893 "lastModified": 1, 8922 "lastModified": 1,
8923 "narHash": "sha256-5AakznhrJFmwCD7lr4JEh55MtdAJL6WA/YuBks6ISSE=",
8924 "path": "../../secrets",
8925 "type": "path"
8926 },
8927 "original": {
8928 "path": "../../secrets",
8929 "type": "path"
8930 }
8931 },
8932 "secrets_29": {
8933 "locked": {
8934 "lastModified": 1,
8894 "narHash": "sha256-yvhc2jxW1AQVmtrKPoYPr5DgpXKt/ua+ATuxvE3iY6c=", 8935 "narHash": "sha256-yvhc2jxW1AQVmtrKPoYPr5DgpXKt/ua+ATuxvE3iY6c=",
8895 "path": "./private/environment-dummy", 8936 "path": "./private/environment-dummy",
8896 "type": "path" 8937 "type": "path"
diff --git a/flakes/private/borg_backup/flake.nix b/flakes/private/borg_backup/flake.nix
index ad7d6eb..ab288f6 100644
--- a/flakes/private/borg_backup/flake.nix
+++ b/flakes/private/borg_backup/flake.nix
@@ -130,6 +130,13 @@
130 Whether to enable remote backups. 130 Whether to enable remote backups.
131 ''; 131 '';
132 }; 132 };
133 services.borgBackup.cronSpec = lib.mkOption {
134 type = lib.types.str;
135 default = "0 0 * * *";
136 description = ''
137 Cron spec for running borgbackup
138 '';
139 };
133 services.borgBackup.helpers = lib.mkOption { 140 services.borgBackup.helpers = lib.mkOption {
134 readOnly = true; 141 readOnly = true;
135 description = '' 142 description = ''
@@ -310,7 +317,7 @@
310 services.cron = { 317 services.cron = {
311 enable = true; 318 enable = true;
312 systemCronJobs = [ 319 systemCronJobs = [
313 "0 0 * * * root ${borg_backup}/bin/borg_backup 300" 320 "${config.services.borgBackup.cronSpec} root ${borg_backup}/bin/borg_backup 300"
314 ]; 321 ];
315 322
316 }; 323 };
diff --git a/systems/backup-2/base.nix b/systems/backup-2/base.nix
index 61eecc9..cdaebd3 100644
--- a/systems/backup-2/base.nix
+++ b/systems/backup-2/base.nix
@@ -93,6 +93,7 @@
93 }; 93 };
94 94
95 services.borgBackup.enable = true; 95 services.borgBackup.enable = true;
96 services.borgBackup.cronSpec = "30 3 * * *";
96 97
97 services.rsyncBackup = { 98 services.rsyncBackup = {
98 mountpoint = "/backup2"; 99 mountpoint = "/backup2";
diff --git a/systems/backup-2/flake.lock b/systems/backup-2/flake.lock
index 83e1cad..c2a087b 100644
--- a/systems/backup-2/flake.lock
+++ b/systems/backup-2/flake.lock
@@ -23,7 +23,7 @@
23 }, 23 },
24 "locked": { 24 "locked": {
25 "lastModified": 1, 25 "lastModified": 1,
26 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 26 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
27 "path": "../../flakes/private/borg_backup", 27 "path": "../../flakes/private/borg_backup",
28 "type": "path" 28 "type": "path"
29 }, 29 },
diff --git a/systems/eldiron/flake.lock b/systems/eldiron/flake.lock
index bb961b0..8392aa7 100644
--- a/systems/eldiron/flake.lock
+++ b/systems/eldiron/flake.lock
@@ -1985,7 +1985,7 @@
1985 }, 1985 },
1986 "locked": { 1986 "locked": {
1987 "lastModified": 1, 1987 "lastModified": 1,
1988 "narHash": "sha256-8fef5NmMlX9+iOpw1/qXEtJ6cAWFvV/SO6YJs1e3D4U=", 1988 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
1989 "path": "../../flakes/private/borg_backup", 1989 "path": "../../flakes/private/borg_backup",
1990 "type": "path" 1990 "type": "path"
1991 }, 1991 },
diff --git a/systems/zoldene/base.nix b/systems/zoldene/base.nix
index 947859a..187eb11 100644
--- a/systems/zoldene/base.nix
+++ b/systems/zoldene/base.nix
@@ -16,6 +16,9 @@ in
16 ./synapse.nix 16 ./synapse.nix
17 ]; 17 ];
18 18
19 services.borgBackup.enable = true;
20 services.borgBackup.cronSpec = "0 20 * * *";
21
19 programs.ssh.package = pkgs.openssh; 22 programs.ssh.package = pkgs.openssh;
20 services.openssh = { 23 services.openssh = {
21 settings.KbdInteractiveAuthentication = false; 24 settings.KbdInteractiveAuthentication = false;
diff --git a/systems/zoldene/flake.lock b/systems/zoldene/flake.lock
index e8389c6..bd8fc48 100644
--- a/systems/zoldene/flake.lock
+++ b/systems/zoldene/flake.lock
@@ -68,6 +68,18 @@
68 "type": "path" 68 "type": "path"
69 } 69 }
70 }, 70 },
71 "environment_2": {
72 "locked": {
73 "lastModified": 1,
74 "narHash": "sha256-PQ5694ARRlpj00lk/C/T0UPGhPO+n0TEcLR1mde0s8M=",
75 "path": "../environment",
76 "type": "path"
77 },
78 "original": {
79 "path": "../environment",
80 "type": "path"
81 }
82 },
71 "flake-compat": { 83 "flake-compat": {
72 "flake": false, 84 "flake": false,
73 "locked": { 85 "locked": {
@@ -433,6 +445,22 @@
433 "type": "github" 445 "type": "github"
434 } 446 }
435 }, 447 },
448 "private-borg-backup": {
449 "inputs": {
450 "environment": "environment",
451 "secrets": "secrets"
452 },
453 "locked": {
454 "lastModified": 1,
455 "narHash": "sha256-Kt/2cr2zTi341YxLHDQAc5aYfEyuoVLpZQ9pJFDjwrc=",
456 "path": "../../flakes/private/borg_backup",
457 "type": "path"
458 },
459 "original": {
460 "path": "../../flakes/private/borg_backup",
461 "type": "path"
462 }
463 },
436 "private-environment": { 464 "private-environment": {
437 "locked": { 465 "locked": {
438 "lastModified": 1, 466 "lastModified": 1,
@@ -448,7 +476,7 @@
448 "private-system": { 476 "private-system": {
449 "inputs": { 477 "inputs": {
450 "backports": "backports", 478 "backports": "backports",
451 "environment": "environment", 479 "environment": "environment_2",
452 "mypackages": "mypackages", 480 "mypackages": "mypackages",
453 "myuids": "myuids", 481 "myuids": "myuids",
454 "secrets-public": "secrets-public" 482 "secrets-public": "secrets-public"
@@ -481,11 +509,24 @@
481 "impermanence": "impermanence", 509 "impermanence": "impermanence",
482 "my-lib": "my-lib", 510 "my-lib": "my-lib",
483 "nixpkgs": "nixpkgs_5", 511 "nixpkgs": "nixpkgs_5",
512 "private-borg-backup": "private-borg-backup",
484 "private-environment": "private-environment", 513 "private-environment": "private-environment",
485 "private-system": "private-system", 514 "private-system": "private-system",
486 "public-secrets": "public-secrets" 515 "public-secrets": "public-secrets"
487 } 516 }
488 }, 517 },
518 "secrets": {
519 "locked": {
520 "lastModified": 1,
521 "narHash": "sha256-5AakznhrJFmwCD7lr4JEh55MtdAJL6WA/YuBks6ISSE=",
522 "path": "../../secrets",
523 "type": "path"
524 },
525 "original": {
526 "path": "../../secrets",
527 "type": "path"
528 }
529 },
489 "secrets-public": { 530 "secrets-public": {
490 "locked": { 531 "locked": {
491 "lastModified": 1, 532 "lastModified": 1,
diff --git a/systems/zoldene/flake.nix b/systems/zoldene/flake.nix
index 7b7b4b7..52db1c4 100644
--- a/systems/zoldene/flake.nix
+++ b/systems/zoldene/flake.nix
@@ -6,6 +6,7 @@
6 public-secrets.url = "path:../../flakes/secrets"; 6 public-secrets.url = "path:../../flakes/secrets";
7 private-environment.url = "path:../../flakes/private/environment"; 7 private-environment.url = "path:../../flakes/private/environment";
8 private-system.url = "path:../../flakes/private/system"; 8 private-system.url = "path:../../flakes/private/system";
9 private-borg-backup.url = "path:../../flakes/private/borg_backup";
9 }; 10 };
10 outputs = inputs@{ self, nixpkgs, my-lib, ... }: 11 outputs = inputs@{ self, nixpkgs, my-lib, ... }:
11 my-lib.lib.mkColmenaFlake { 12 my-lib.lib.mkColmenaFlake {
@@ -25,6 +26,7 @@
25 26
26 secrets = public-secrets.nixosModule; 27 secrets = public-secrets.nixosModule;
27 28
29 borg-backup = private-borg-backup.nixosModule;
28 environment = private-environment.nixosModule; 30 environment = private-environment.nixosModule;
29 system = private-system.nixosModule; 31 system = private-system.nixosModule;
30 }; 32 };
diff --git a/systems/zoldene/virtualisation.nix b/systems/zoldene/virtualisation.nix
index d2212fe..424f43f 100644
--- a/systems/zoldene/virtualisation.nix
+++ b/systems/zoldene/virtualisation.nix
@@ -6,6 +6,14 @@
6 virtualisation.docker.enable = true; 6 virtualisation.docker.enable = true;
7 disko.devices.zpool.zfast.datasets."root/persist/var/lib/docker" = 7 disko.devices.zpool.zfast.datasets."root/persist/var/lib/docker" =
8 { type = "zfs_fs"; mountpoint = "/persist/zfast/var/lib/docker"; options.mountpoint = "legacy"; }; 8 { type = "zfs_fs"; mountpoint = "/persist/zfast/var/lib/docker"; options.mountpoint = "legacy"; };
9 systemd.services.docker.after = [
10 "var-lib-docker.mount"
11 "persist-zfast-var-lib-docker.mount"
12 ];
13 systemd.services.docker.unitConfig.BindsTo = [
14 "var-lib-docker.mount"
15 "persist-zfast-var-lib-docker.mount"
16 ];
9 17
10 ### Enable LXC 18 ### Enable LXC
11 disko.devices.zpool.zfast.datasets."root/persist/var/lib/lxc" = 19 disko.devices.zpool.zfast.datasets."root/persist/var/lib/lxc" =
@@ -14,12 +22,21 @@
14 enable = true; 22 enable = true;
15 lxcfs.enable = true; 23 lxcfs.enable = true;
16 }; 24 };
25 systemd.services.lxc.after = [
26 "var-lib-lxc.mount"
27 "persist-zfast-var-lib-lxc.mount"
28 ];
29 systemd.services.lxc.unitConfig.BindsTo = [
30 "var-lib-lxc.mount"
31 "persist-zfast-var-lib-lxc.mount"
32 ];
17 33
18 ### Enable libvirtd 34 ### Enable libvirtd
19 virtualisation.libvirtd = { 35 virtualisation.libvirtd = {
20 enable = true; 36 enable = true;
21 qemu.package = pkgs-no-overlay.qemu; 37 qemu.package = pkgs-no-overlay.qemu;
22 }; 38 };
39 # No persistence for libvirtd: config is supposed to be persisted via config
23 40
24 ### Persistence for LXC / Docker 41 ### Persistence for LXC / Docker
25 environment.persistence."/persist/zfast".directories = [ 42 environment.persistence."/persist/zfast".directories = [
@@ -43,4 +60,3 @@
43 "net.ipv4.conf.default.forwarding" = true; 60 "net.ipv4.conf.default.forwarding" = true;
44 }; 61 };
45} 62}
46